Security Soapbox | Privacy, Security and Everything in Between

This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.

Q1 2025 Mobile Threat Landscape Overview

The Q1 2025 Lookout Mobile Threat Landscape Report highlights emerging human risk and AI as the primary drivers of security threats. This most recent report emphasizes that attackers are targeting individuals through their mobile devices early in their attacks – exploiting the native trust we have in these devices and our natural tendencies to engage with communications that drive curiosity.

06-25
05:57

Cybersecurity Predictions: A Look into 2025's Security Landscape

2024 saw a surge in cyberattacks alongside rapid tech advancements, making it clear that staying ahead in the digital world is more important than ever. In this week's session, we’ll explore the top cybersecurity predictions for 2025 — highlighting emerging threats, key trends, and the latest strategies for fortifying your defenses. Listen as our expert panel shares valuable insights and predictions on: New ransomware tactics and data breach methods How AI is shaping both security solutions and cyberattacks Growing threats from nation-states The latest security regulations and compliance frameworks

01-17
41:17

Securing Democracy: Election Integrity, Threats and Solutions with Jim Coyle

On this week’s episode of Security Soapbox, we are joined by Jim Coyle, US Public Sector Field CTO at Lookout. We’re diving into the hot topic of election security; unpacking various threats, like disinformation campaigns, cyber espionage, and weaknesses in our election infrastructure — and who’s behind them. We’ll also chat about current protective measures and some innovative ideas, like using blockchain to fight misinformation. Watch the Billington Cybersecurity Summit session on Election Security here. Follow Hank on LinkedIn Follow Jim on LinkedIn

10-24
32:46

Why is my CEO Texting me? What to do About Executive Impersonation Attacks

We’ve all received that urgent text message from our “CEO” asking us to take care of an urgent task. This form of social engineering has become a preferred tactic by threat actors who want to create a high-pressure situation in order to convince employees to send money or share sensitive data.  This week’s episode will cover the why and how behind these attacks. We will also cover the critical role they play in the modern kill chain and how to protect against them.  To see how Lookout protects against advanced smishing and executive impersonation attacks, read our release blog or watch the short overview video below.  Blog: https://www.lookout.com/blog/smishing-prevention-executive-impersonation Video: https://vimeo.com/1009294652  

10-16
05:12

Advanced Web Threats: Data Leaks, Shadow IT, and AI

On this week’s episode of Security Soapbox, we are joined by Charity Spiri, who oversees the Security Service Edge (SSE) product portfolio at Lookout. Were challenging the common perception of web-based threats being solely network attacks. Web threats encompass a wider range of risks, including data leakage, shadow IT, and security concerns from AI platforms. While not entirely new issues, these pose significant challenges within the ever-evolving web-based threat landscape. For a deeper dive into advanced web threats and how to protect your organization, check out Charity’s recent session, Defending Against Advanced Threats with a Modern Secure Web Gateway. Follow Hank Schless on LinkedIn Follow Charity Spiri on LinkedIn

10-11
13:48

5 Minute Friday | A New EU Mandate Makes iOS Less Secure

In this week's episode of 5 Minute Friday, we discuss the new Digital Markets Act (DMA) in the EU and its potential impact on iOS security. We talk through the possible security risks and malware threats that could come from opening iOS devices to third-party app stores. To keep up to date on current threats: ⁠www.lookout.com/threat-intelligence

03-22
06:32

5 Minute Friday | BadBazaar: iOS and Android Used to Target Tibetans and Uyghurs

In this week's episode of 5 Minute Friday, we discuss BadBazaar, an iOS & Android surveillanceware by China's APT-15, designed to target Uyghur Muslims. We take a dive into the invasive nature of Chinese "pre-criminal" surveillance and BadBazaar's recent expansion to iOS devices, providing insights into its early development and the evolving landscape of mobile threats. To keep up to date on current threats: www.lookout.com/threat-intelligence

01-26
04:38

5 Minute Friday | Critical Vulnerabilities in iOS & Android

In this week's episode of 5 Minute Friday, we discuss three critical vulnerabilities affecting both iOS and Android devices. We also discuss the importance of patching these vulnerabilities, and the modern phishing attack tactics used to exploit them. To keep up to date on current threats: www.lookout.com/threat-intelligence

12-08
05:02

Unveiling the Impact of Cyber Poverty with Ramy Houssaini

In this episode, host Hank Schless welcomes back Ramy Houssaini, Chief Cyber & Technology Risk Officer at BNP Paribas and Founding Chair of The Cyber Poverty Line Institute. They explore the concept of 'cyber poverty,' and shed light on the global disparity in cybersecurity resources, highlighting the critical need for inclusive cyber capability building to safeguard individuals and societies worldwide. For more information on the Cyber Poverty Line Institute, visit: www.cyberpovertyline.org For more information on Lookout, visit: www.lookout.com Connect with Ramy Houssaini on LinkedIn here: www.linkedin.com/in/strategicleadership Connect with Hank Schless on LinkedIn here: www.linkedin.com/in/hank-schless

12-07
28:52

5 Minute Friday | Robin Banks: A Poster Child for MFA Bypass

In this week's episode of 5 Minute Friday, we discuss the resurgence of the Robin Banks, a phishing-as-a-service kit, and its tactics like MFA bypass. We also discuss related threats such as 0ktapus, showcasing evolving cyber threats and the replication of successful attack methods among different groups. To stay up to date on recent threat intelligence, ⁠⁠click here⁠.

11-17
03:32

5 Minute Friday | Dropper as a Service

In this episode of 5 Minute Friday, we discuss droppers, a type of mobile malware that serves as a middleman between a target device and the threat actor's command and control server. Droppers are now being offered as a service, which could enable more advanced malware to get on more devices.  To stay up to date on recent threat intelligence, ⁠click here⁠.

11-10
04:36

5 Minute Friday | Arid Viper: The Mobile Malware Threat

In this episode of 5 Minute Friday, we discuss recent research related to the advanced persistent threat (APT) group Arid Viper. Learn about how their tactics for targeting mobile users are exemplary of an attack chain that many cybercriminals use and why it's so effective To stay up to date on recent threat intelligence, click here.

11-03
04:29

5 Minute Friday | Unveiling Infamous Chisel, Sandworm, and Deblind

In this episode of Five Minute Friday, we delve into the shadowy world of cyber espionage as we explore Infamous Chisel, Sandworm, and Deblind. Discover how the Russian APT group, Sandworm, known for major international cyberattacks, ventured into mobile surveillance with Infamous Chisel. Learn about Deblind, a system-level Android app that operates with unprecedented privileges, collecting user activity and suppressing security warnings. For more information, visit: www.lookout.com/threat-intelligence/article/russian-sandworm-apt-infamous-chisel-deblind-spyware

11-02
04:29

5 Minute Friday | Red Alert-Rocket Alerts: A Malicious Threat Exploiting Societal Disruption

In this episode of Five Minute Friday, we discuss how societal disruption creates opportunities for malicious actors to exploit people's uncertainties. In this case, we examine a recent case where a malicious version of the legitimate mobile app, RedAlert - Rocket Alerts, was distributed, targeting individuals in Israel. To stay protected against these types of mobile threats, click here.

11-02
05:03

5 Minute Friday | iLeakage: The Hidden Threat to Your iOS Device

On this week’s episode of 5 Minute Friday, we are discussing a recent iOS vulnerability, iLeakage, that exploits your web browser including opened tabs and login credentials. Learn more about iLeakage and the importance of protecting your mobile device —  the device that goes everywhere you do. For additional resources on protecting your mobile device, visit: www.lookout.com/products/endpoint-security/mobile-endpoint-security

11-02
03:46

5 Minute Friday | Scattered Spider, MGM, and Caesars

Caesars Entertainment and MGM resorts were recently breached by a well-known cybercrime group, Scattered Spider. Listen to this week’s 5 Minute Friday to learn about these attacks, how this group operates, and what you can do to avoid your organization being the next target. For a deeper dive, visit: www.lookout.com/documents/threat-reports/us/lookout_tg_scatteredspider.pdf

09-14
04:53

Soap Suds: Protect Your Data From Risky Apps Like TikTok

Recent hype around Chinese apps TikTok and Pinduoduo has put a spotlight on the risk surrounding mobile apps. In this quick-fire Soap Suds episode, host Hank Schless discusses the concerns behind these Chinese apps and highlights the reasons why organizations need to keep tabs on mobile apps in general to minimize the risk to their data. For more information on data collection related security threats and how to ban risky apps like TikTok, check out our blog: https://bit.ly/tiktok-podcast

04-24
06:23

Data Overload: Edge Computing Augmenting Our Cloud-first World (ft. Said Ouissal/ZEDEDA)

With more devices than humans in our world today, the amount of data being generated is higher than ever, with no sign of slowing down. Enter: edge computing. In this episode, host Hank Schless is joined by Said Ouissal, Founder and CEO at ZEDEDA, to discuss edge computing — from its business applications to the challenges of securing the technology and everything in between.

04-10
22:30

Don’t Think Twice, Modern IT is Alright: Top Ways to Modernize Your IT Today (ft. Faz Sadikali, Cloud Insights)

Organizations are making big decisions to implement cloud solutions to boost collaboration and gain competitive advantage. But many aren’t prepared to handle the risks that cloud services introduce. In this episode of Security Soapbox, host Hank Schless talks shop with Faz Sadikali, Founder of Cloud Insights, on how to build secure workstreams and level up IT to reap the benefits of the cloud while ensuring data remains secure. Read Faz's blog about IT modernization here: https://bit.ly/3h3qqlW

12-05
20:48

The Sleeping Giant is Waking Up: the State of Mobile Security Today ft. Cile Montgomery/VMware

With the rapid adoption of BYOD and the growing remote workforce, IT and security teams are just catching on to the need for mobile security to protect corporate data and assets. In this episode, host Hank Schless is joined by Cile Montgomery, Product Line Marketing Manager at VMware, to discuss the new risks mobile devices present to organizations and what trends to expect in the next year for mobile security.

11-14
17:08

Recommend Channels